General
-
Target
44e2057c7466881a61e3b542ce055b3d54aa7d88040ce879a915e20ed996d097
-
Size
1.7MB
-
Sample
240410-mrfvlscg63
-
MD5
f2c89362da39a76b1fc08e1ff6a9a2e9
-
SHA1
ebaaa5c54d44058a2f24503d8c5a587f7c93e0c5
-
SHA256
44e2057c7466881a61e3b542ce055b3d54aa7d88040ce879a915e20ed996d097
-
SHA512
2991e7b9554efdd451b0d9e8a5351bd1da5fbca08803d00aec4a2c6a3b516602e70249c62b1de64bfe497d65512e05f9966d6c8c4a8224dca58a69276b463c34
-
SSDEEP
24576:3qTLMBPG2jLwPAn3Ow3EliFrxiYMUiWfy17AWIDPXgT1l:3ELo1+gEAFtnMJOy17AWoPQT3
Static task
static1
Behavioral task
behavioral1
Sample
44e2057c7466881a61e3b542ce055b3d54aa7d88040ce879a915e20ed996d097.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
44e2057c7466881a61e3b542ce055b3d54aa7d88040ce879a915e20ed996d097.dll
Resource
win10v2004-20240226-en
Malware Config
Extracted
cobaltstrike
1580103824
http://verofes.com:443/apiv8/getStatus
-
access_type
512
-
beacon_type
2048
-
host
verofes.com,/apiv8/getStatus
-
http_header1
AAAACgAAABFYLUNsaWVudDogbm90ZXZpbAAAAAcAAAAAAAAAAwAAAAYAAAAGQ29va2llAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAABFYLUNsaWVudDogbm90ZXZpbAAAAAcAAAAAAAAADQAAAAUAAAADa2V5AAAABwAAAAEAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
10000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCRhpLz5zd8IwTeaGg6uRpSTHcIB2GGozjmWW5EmiCpa/f3kwlNwNnGn5q6W7unmsML+fh3kap/X7IHPaABhoukG7fYev8J7emKVrRiuIGhEWBKcDXn7L8+LuRY4KfqmRXs79U3eGPm44BC9cbY1Z9svN+81LgSIYBJ8W3ub+x14wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/apiv8/updateConfig
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.110 Safari/537.36 Edg/96.0.1054.62
-
watermark
1580103824
Targets
-
-
Target
44e2057c7466881a61e3b542ce055b3d54aa7d88040ce879a915e20ed996d097
-
Size
1.7MB
-
MD5
f2c89362da39a76b1fc08e1ff6a9a2e9
-
SHA1
ebaaa5c54d44058a2f24503d8c5a587f7c93e0c5
-
SHA256
44e2057c7466881a61e3b542ce055b3d54aa7d88040ce879a915e20ed996d097
-
SHA512
2991e7b9554efdd451b0d9e8a5351bd1da5fbca08803d00aec4a2c6a3b516602e70249c62b1de64bfe497d65512e05f9966d6c8c4a8224dca58a69276b463c34
-
SSDEEP
24576:3qTLMBPG2jLwPAn3Ow3EliFrxiYMUiWfy17AWIDPXgT1l:3ELo1+gEAFtnMJOy17AWoPQT3
Score10/10 -